US9372965B2 - Methods and apparatus for displaying simulated digital content - Google Patents
Methods and apparatus for displaying simulated digital content Download PDFInfo
- Publication number
- US9372965B2 US9372965B2 US14/340,214 US201414340214A US9372965B2 US 9372965 B2 US9372965 B2 US 9372965B2 US 201414340214 A US201414340214 A US 201414340214A US 9372965 B2 US9372965 B2 US 9372965B2
- Authority
- US
- United States
- Prior art keywords
- electronic device
- viewing conditions
- content
- information
- displayable content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H04W4/206—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
- H04W4/21—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
Definitions
- the present disclosure relates to systems, methods, and devices for displaying digital content.
- the security and privacy of the content can be compromised in various ways.
- the content may be accessed by an unintended recipient and/or an adversarial recipient.
- transmission of the content may be intercepted, or a breach of trust may occur with an intended recipient or with a hosted server.
- a breach of security may occur with a hosted server or a displaying device.
- Various electronic applications have attempted to increase the privacy of mildly-sensitive digital content and casual digital content (e.g., content that does not require a permanent record) by using ephemeral messages that are deleted in one form after a short period of time.
- Examples of ephemeral messaging include Snapchat, Inc.'s Snapchat application, Facebook, Inc.'s MessageMe and Poke applications, and Kismet's Blink application.
- Such applications may merely provide a cosmetic solution to privacy concerns, however, as it is possible to capture a permanent record of digital content by taking a screenshot of the content, and as it may be difficult to ensure permanent deletion of the content from an application server. For example, digital images may never be completely deleted from some ephemeral messaging servers.
- Bump Technologies, Inc. may be used to enable proximity-based mobile-to-mobile connections
- the Bump application may rely on a client-server model and may require recording of geo-location data to instantiate the connections.
- Such use of a client-server model, as well the recording of geo-location data may reduce communications security and privacy.
- BBM BlackBerry's BlackBerry Messenger
- the present invention relates to a method of simulating digital content.
- the method includes providing information corresponding to a plurality of pixels of displayable content at an electronic device; and simulating the displayable content at the electronic device by displaying a representation of a first subset of the plurality of pixels during a first time period and displaying a representation of a second subset of the plurality of pixels during a second time period.
- the electronic device comprises a first electronic device and providing the information comprises transmitting the information from a second electronic device to the first electronic device.
- the first and second electronic devices comprise first and second peer devices, respectively, in a peer-to-peer network and transmitting the information comprises transmitting the information from the second peer device to the first peer device.
- the first and second electronic devices comprise client and server devices, respectively, in a client-server network and transmitting the information comprises transmitting the information from the server device to the client device.
- transmitting the information from the second electronic device to the first electronic device comprises transmitting the information via an electronic message from the second electronic device to the first electronic device and simulating the displayable content comprises simulating the displayable content at the electronic device until reaching a time limit of the electronic message.
- transmitting the information from the second electronic device to the first electronic device includes transmitting the information via an electronic message from the second electronic device to the first electronic device and the displayable content comprises text of the electronic message.
- the displayable content includes a photo comprising the plurality of pixels.
- providing the information comprises generating the information at the electronic device without using a network connection.
- the first and second subsets of the plurality of pixels comprise first and second pseudorandom subsets, respectively, of the plurality of pixels
- displaying the representation of the first subset of the plurality of pixels comprises displaying a representation of the first pseudorandom subset of the plurality of pixels during the first time period
- displaying the representation of the second subset of the plurality of pixels comprises displaying a representation of the second pseudorandom subset of the plurality of pixels during the second time period.
- simulating the displayable content comprises simulating the displayable content at the electronic device only as long as one or more viewing conditions are met with respect to the electronic device.
- that method further includes measuring the one or more viewing conditions using a sensor of the electronic device.
- measuring the one or more viewing conditions comprises measuring the one or more viewing conditions using a camera, a light sensor, a position sensor, and/or a motion sensor of the electronic device.
- the one or more viewing conditions comprise a verification of a security key of the electronic device.
- that method further includes determining that a display screen of the electronic device is unlikely to be visible to a third party in response to a determination that the one or more viewing conditions are met with respect to the electronic device.
- the method further includes determining whether a physical privacy screen is used with the electronic device, wherein simulating the displayable content at the electronic device includes providing a first simulation of the displayable content in response to determining that the physical privacy screen is used with the electronic device or providing a second simulation of the displayable content in response to determining that the physical privacy screen is absent from the electronic device.
- the present invention includes a computer program product having a non-transitory computer readable storage medium including computer readable program code therein configured to provide information corresponding to a plurality of pixels of displayable content at an electronic device; and simulate the displayable content at the electronic device by displaying a representation of a first subset of the plurality of pixels during a first time period and displaying a representation of a second subset of the plurality of pixels during a second time period.
- the present invention relates to a method of simulating digital content.
- the method includes providing information corresponding to displayable content at an electronic device and simulating, using the information, the displayable content at the electronic device by displaying a representation of a first portion of the displayable content during a first time period and displaying a representation of a second portion of the displayable content during a second time period.
- the electronic device comprises a first electronic device and providing the information comprises transmitting the information from a second electronic device to the first electronic device.
- the first and second electronic devices comprise first and second peer devices, respectively, in a peer-to-peer network and transmitting the information comprises transmitting the information from the second peer device to the first peer device.
- the first and second electronic devices comprise client and server devices, respectively, in a client-server network and transmitting the information comprises transmitting the information from the server device to the client device.
- transmitting the information from the second electronic device to the first electronic device comprises transmitting the information via an electronic message from the second electronic device to the first electronic device and simulating the displayable content comprises simulating the displayable content at the electronic device until reaching a time limit of the electronic message.
- providing the information comprises generating the information at the electronic device without using a network connection.
- the first and second subsets of the plurality of pixels comprise first and second pseudorandom subsets, respectively, of the plurality of pixels
- displaying the representation of the first subset of the plurality of pixels comprises displaying a representation of the first pseudorandom subset of the plurality of pixels during the first time period
- displaying the representation of the second subset of the plurality of pixels comprises displaying a representation of the second pseudorandom subset of the plurality of pixels during the second time period.
- the displayable content includes a photo comprising the plurality of pixels.
- the method further includes determining whether a display screen of the electronic device is unlikely to be visible to a third party and simulating the displayable content includes simulating the displayable content at the electronic device responsive to determining that the display screen of the electronic device is unlikely to be visible to the third party. In one embodiment, that method further includes continuing to determine whether the display screen of the electronic device is unlikely to be visible to the third party after beginning simulating the displayable content at the electronic device and discontinuing simulating the displayable content at the electronic device in response to determining that the display screen of the electronic device is not unlikely to be visible to the third party.
- the determination that the display screen of the electronic device is unlikely to be visible to the third party includes a determination that one or more viewing conditions are met with respect to the electronic device.
- that method further includes measuring the one or more viewing conditions using a sensor of the electronic device.
- measuring the one or more viewing conditions includes measuring the one or more viewing conditions using a camera, a light sensor, a position sensor, and/or a motion sensor of the electronic device.
- the one or more viewing conditions include a verification of a security key of the electronic device.
- transmitting the information from the second electronic device to the first electronic device includes transmitting the information via an electronic message from the second electronic device to the first electronic device and the displayable content includes text of the electronic message.
- the method further includes determining whether a physical privacy screen is used with the electronic device, and simulating the displayable content at the electronic device includes providing a first simulation of the displayable content in response to determining that the physical privacy screen is used with the electronic device or providing a second simulation of the displayable content in response to determining that the physical privacy screen is absent from the electronic device.
- the present invention includes a computer program product having a non-transitory computer readable storage medium including computer readable program code therein configured to provide information corresponding to displayable content at an electronic device and simulating, using the information, the displayable content at the electronic device by displaying a representation of a first portion of the displayable content during a first timer period and displaying a representation of a second portion of the displayable content during a second time period.
- the present invention relates to a method of providing digital content.
- the method includes providing information corresponding to displayable content at an electronic device, determining whether one or more viewing conditions are met with respect to the electronic device and displaying the displayable content at the electronic device in response to determining that the one or more viewing conditions are met with respect to the electronic device.
- the method further includes continuing to determine whether the one or more viewing conditions are met after beginning displaying the displayable content at the electronic device and discontinuing displaying the displayable content at the electronic device in response to determining that the one or more viewing conditions are no longer met with respect to the electronic device.
- the one or more viewing conditions include a verification of a security key of the electronic device.
- the method further includes measuring the one or more viewing conditions using a sensor of the electronic device.
- measuring the one or more viewing conditions includes measuring the one or more viewing conditions using a camera, a light sensor, a position sensor, and/or a motion sensor of the electronic device.
- the method further includes determining that a display screen of the electronic device is unlikely to visible to a third party in response to determining that the one or more viewing conditions are met with respect to the electronic device and displaying the displayable content includes displaying the displayable content at the electronic device in response to determining that the display screen of the electronic device is unlikely to be visible to the third party.
- the method further includes decrypting the information before displaying the displayable content in response to determining that the one or more viewing conditions are met with respect to the electronic device.
- providing the information corresponding to the displayable content includes providing the information corresponding to the displayable content along with information regarding the one or more viewing conditions.
- determining whether the one or more viewing conditions are met with respect to the electronic device includes using the information regarding the one or more viewing conditions when determining whether the one or more viewing conditions are met with respect to the electronic device.
- the electronic device includes a first electronic device and providing the information includes transmitting the information from a second electronic device to the first electronic device.
- the first and second electronic devices include first and second peer devices, respectively, in a peer-to-peer network and transmitting the information includes transmitting the information from the second peer device to the first peer device.
- the first and second electronic devices include client and server devices, respectively, in a client-server network and transmitting the information includes transmitting the information from the server device to the client device.
- providing the information includes generating the information at the electronic device without using a network connection.
- determining whether the one or more viewing conditions are met with respect to the electronic device includes determining whether a physical privacy screen is used with the electronic device.
- FIG. 1A is a flowchart of a method of simulating digital content in accord with the present invention
- FIG. 1B is a flowchart of another method of simulating digital content in accord with the present invention.
- FIG. 1C is a flowchart illustrating operations of simulating digital content according to various embodiments of the inventive concepts
- FIG. 2A is a flowchart illustrating a method of displaying simulated digital content in response to satisfying one or more viewing conditions of a user's electronic device according to various embodiments of the inventive concepts;
- FIG. 2B is a flowchart illustrating another method of displaying simulated digital content in response to satisfying one or more viewing conditions of a user's electronic device according to various embodiments of the inventive concepts;
- FIG. 3 is a flowchart illustrating operations of delivering/displaying digital content in response to satisfying one or more viewing conditions of a user's electronic device according to various embodiments of the inventive concepts
- FIG. 4 is a diagram illustrating subsets of pixels that are displayed during different time periods T 1 -T 3 at a user's electronic device;
- FIG. 5 is a diagram illustrating an example of using operations according to various embodiments described herein to reduce/prevent screenshotting of a received photo
- FIG. 6 is a diagram illustrating an example of using operations according to various embodiments described herein to reduce/prevent screenshotting of a received text message
- FIG. 7 is a diagram illustrating audible and inaudible zones of sound that can be produced by a speaker of a user's electronic device.
- FIG. 8 is a block diagram of an exemplary apparatus in accord with the present invention.
- first and second may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another element. Thus, a first element could be termed a second element, and similarly, a second element may be termed a first element without departing from the teachings of the inventive concepts.
- Example embodiments of the inventive concepts may be embodied as systems, methods, and devices. Accordingly, example embodiments of the inventive concepts may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). Furthermore, example embodiments of the inventive concepts may take the form of a computer program product comprising a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system.
- a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
- the computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device. More specific examples (a nonexhaustive list) of the computer-readable medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disc read-only memory (CD-ROM).
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- CD-ROM portable compact disc read-only memory
- the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
- Example embodiments of the inventive concepts are described herein with reference to flowchart and/or block diagram illustrations. It will be understood that each block of the flowchart and/or block diagram illustrations, and combinations of blocks in the flowchart and/or block diagram illustrations, may be implemented by computer program instructions and/or hardware operations. These computer program instructions may be provided to a processor of a general purpose computer, a special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means and/or circuits for implementing the functions specified in the flowchart and/or block diagram block or blocks.
- These computer program instructions may also be stored in a computer usable or computer-readable memory that may direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer usable or computer-readable memory produce an article of manufacture including instructions that implement the functions specified in the flowchart and/or block diagram block or blocks.
- the computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart and/or block diagram block or blocks.
- inventive concepts described herein address privacy and security concerns within the context of digital content delivery applications. Accordingly, although many electronic applications may suffer from privacy vulnerabilities, various embodiments of the inventive concepts herein may address such vulnerabilities. For example, some embodiments may address privacy vulnerabilities by simulating an original representation of displayed content without actually serving the content to an electronic device's display. Moreover, some embodiments may further address privacy vulnerabilities by using encryption techniques and/or other security technologies.
- information may be provided at a user's electronic device (Block 105 ) and may be used to simulate displayable content (Block 110 ).
- the information may represent content that is stored and/or displayed at an electronic device other than the user's electronic device.
- the information may represent a digital photo, video, email message, text message (e.g., a Short Message Service (SMS) or Multimedia Messaging Service (MMS) message), website, or any other visual content that can be displayed using an electronic device.
- SMS Short Message Service
- MMS Multimedia Messaging Service
- the information may be electronic (e.g., digital) information transmitted from a server or another electronic device to the user's electronic device via a wired communications network and/or a wireless communications network.
- the information may be transmitted to the user's electronic device exclusively via peer-to-peer messaging rather than using a client-server model.
- intermediate peers may be used to relay the information from an originating electronic device to the user's electronic device, and the message may be secured such that the intermediate peers cannot read the message that they are relaying.
- peer-to-peer messaging rather than a client-server model
- various embodiments of the inventive concepts may reduce/prevent the storage of sensitive digital content on a server, thus further increasing the security of the digital content.
- providing the information at the user's electronic device at Block 105 may include generating the information at the user's electronic device, rather than receiving the information via a communications network.
- software within the user's electronic device may generate the information, and the software may not require a network connection.
- the information may be provided at the user's electronic device in Block 105 in either an encrypted or unencrypted form. Additionally or alternatively, noise may be added to the information to enhance security.
- simulating the displayable content may include, in one example, displaying (using the information provided in Block 105 ) a simulation at the user's electronic device of the content that is stored and/or displayed at an electronic device transmitting the information to the user's electronic device.
- simulating the displayable content may include simulating (using the information provided in Block 105 ) visual content that may be generated by the user's electronic device without using a network connection, rather than actually displaying the visual content itself.
- the operations of FIG. 1A may be performed by various types of electronic applications, including network-based applications and native software applications.
- the user's electronic device may simulate a visual representation of the digital photo, thus enhancing the security of the digital photo.
- simulating the displayable content at Block 110 may include displaying a plurality of electronic representations of portions of the displayable content at a modified/high frequency.
- Such simulations may be referred to as “chaotic frequency modulation” (although it will be understood that the simulations described herein are not limited thereto).
- the user's electronic device may display a plurality of electronic representations of portions of the digital photo during different time periods, at a modified/high frequency, to simulate a still/static and comprehensive representation of the digital photo.
- various embodiments of the inventive concepts may provide simulations that appear to the human eye like comprehensive representations of displayable content, but that cannot be captured/stored as comprehensive displayable content (e.g., a complete photo or a complete message).
- comprehensive displayable content e.g., a complete photo or a complete message.
- information provided at a user's electronic device may be information corresponding to a plurality of pixels of displayable content (Block 105 B).
- the displayable content may be a digital photo that includes a plurality of pixels, of which there may be a plurality of subsets.
- a representation of a first subset of the plurality of pixels may be displayed by the user's electronic device during a first time period (Block 110 B- 1 ).
- a representation of a second subset of the plurality of pixels may be displayed by the user's electronic device during a second (e.g., subsequent) time period (Block 110 B- 2 ).
- the first and second subsets of the plurality of pixels may individually be incoherent with respect to understanding the comprehensive displayable content. Accordingly, by simulating displayable content as illustrated in FIG. 1B , various embodiments of the inventive concepts may protect against storage of the comprehensive displayable content by the user's electronic device, and may also protect against obtaining the comprehensive displayable content by hacking into hardware (e.g., video hardware) of the user's electronic device.
- the representations of the first and second subsets of the plurality of pixels may be pseudorandom.
- second and subsequent iterations/cycles of the Blocks 110 B- 1 and 110 B- 2 may use different first and second subsets of the plurality of pixels.
- the subset of pixels used in the first subset may change in different iterations/cycles of Block 110 B- 1
- the subset of pixels used in the second subset may change in different iterations/cycles of Block 110 B- 2 .
- FIG. 1B may include three, four, or more operations of displaying representations of subsets of pixels and three, four, or more respective time periods.
- the user's electronic device may continue to display representations of subsets of pixels (e.g., to cycle through Blocks 110 B- 1 and 110 B- 2 ) until (a) the user of the electronic device makes a selection (e.g., via an external switch/button or a graphical user interface of the user's electronic device) to discontinue such display, (b) a message time limit is reached (if the information provided in Block 105 B is communicated via a message), or (c) one or more viewing conditions of the user's electronic device are no longer met (Blocks 115 and 120 ).
- Viewing conditions may include (i) time of day, (ii) angle at which the user's electronic device is oriented, (iii) geographic location of the user's electronic device, (iv) ambient light, (v) sudden movement of the user's electronic device, (vi) whether the user's electronic device is lying (e.g., lying flat) on an object or is being held by a person, and/or (vii) whether the user's electronic device has the same key as a sender of the digital information.
- Blocks 105 C- 120 C of FIG. 1C illustrate that operations of simulating content are not limited to displaying representations of pixels. Rather, the digital content that is simulated using the operations of FIG. 1C may include various types of visual (e.g., displayable) digital content. Accordingly, the first and second pseudorandom subsets of digital content, for which representations are provided in Blocks 110 C- 1 and 110 C- 2 of FIG. 1C , may be first and second pseudorandom subsets of digital text, subsets of a digital photo, subsets of a digital video, etc.
- FIGS. 2A and 2B flowcharts are provided illustrating operations of displaying simulated digital content in response to satisfying one or more viewing conditions of a user's electronic device, according to various embodiments of the inventive concepts.
- the user's electronic device may display simulated digital content in response to satisfying one or more viewing conditions of the user's electronic device (Block 210 ).
- the information provided in Block 205 may be the information described herein regarding Blocks 105 , 105 B, or 105 C of FIGS. 1A-1C , respectively.
- a confidence level may be calculated based on an analysis of one or more viewing conditions for the user's electronic device. For example, receipt/decryption of information (e.g., the digital information provided in Block 205 ) at the user's electronic device may be conditioned upon a threshold confidence level with respect to a likelihood that the display screen of the user's electronic device is not visible to a third party.
- information e.g., the digital information provided in Block 205
- Blocks 210 B- 1 and 210 B- 2 illustrate an example in which the user's electronic device only displays simulated digital content if the display screen of the user's electronic device is unlikely to be visible to a third party.
- a determination that the display screen of the user's electronic device is unlikely to be visible to a third party may be based on one or more viewing conditions. For example, it may be determined that the display screen of the user's electronic device is unlikely to be visible to a third party if fingerprint technology and/or facial-recognition technology of the user's electronic device verifies that an authorized user of the electronic device is currently using the electronic device.
- Block 210 B- 2 The determination as to whether the display screen of the user's electronic device is unlikely to be visible to a third party may be made before and/or after beginning Block 210 B- 2 's display of simulated content at the user's electronic device.
- the display of simulated content (Block 210 B- 2 ) may be responsive to determining (Block 210 B- 1 ) that the display screen of the user's electronic device is unlikely to be visible to a third party.
- operations of determining (Block 210 B- 1 ) whether the display screen of the user's electronic device is unlikely to be visible to the third party may continue after beginning displaying the simulated content (Block 210 B- 2 )(i.e., after beginning simulating the displayable content) at the user's electronic device. Moreover, the user's electronic device may discontinue simulating the displayable content at the user's electronic device in response to determining that the display screen of the user's electronic device is not unlikely to be visible to the third party. Furthermore, it will be understood that Block 210 B- 2 of FIG. 2B may include the operations of Blocks 110 B- 1 through 120 of FIG. 1B .
- viewing conditions may be used to determine a likelihood that a display screen of a user's electronic device is visible to a third party, viewing conditions are not limited to such determinations. Rather, viewing conditions may be used for numerous other reasons, including the safety and/or convenience/preferences of the user (and/or owner of the device), among other reasons.
- FIGS. 1A, 1B, 2A, and 2B may protect against instances of reproducing displayable content by taking a screenshot of a user's electronic device, because taking a screenshot of a simulation of the displayable content will only reproduce a portion of the displayable content.
- taking a screenshot of the simulation of the displayable content may only reproduce a portion of the displayable content that is momentarily displayed at the user's electronic device between the display of other portions of the displayable content, and such a screenshot therefore may not provide a comprehensive reproduction of the displayable content.
- inventive concepts may additionally or alternatively enhance security of displayable content by requiring satisfaction of one or more viewing conditions before and/or while simulating the displayable content.
- security may be enhanced by using encryption and/or by using peer-to-peer messaging rather than client-server models.
- viewing conditions may be implemented in combination with the display of simulated content in some embodiments, viewing conditions and simulated content may also be separate/independent implementations. In other words, operations described herein with respect to viewing conditions may be performed separately/independently from operations described herein with respect to displaying simulated content, and vice versa.
- operations in the flowcharts of FIGS. 1A and 1B may be performed irrespective of whether viewing conditions are satisfied.
- operations described herein with respect to viewing conditions may be performed to deliver/display either simulated or unsimulated content.
- notice e.g., notification
- information e.g., digital content
- Block 305 a vibration, ringtone, display screen illumination, blinking light, image, text, or other audio and/or visual indication
- the notice may be provided with or without information about one or more viewing conditions that must be satisfied to deliver/display the digital content.
- the user's electronic device may use the information about the one or more viewing conditions to determine whether the one or more viewing conditions have been satisfied.
- the user's electronic device may then deliver digital content in response to determining that one or more viewing conditions are satisfied (Blocks 310 - 1 and 310 - 2 ). For example, the user's electronic device may display (at Block 310 - 2 ) an unsimulated digital image that is included in an electronic message received at the user's electronic device.
- the one or more viewing conditions may include, but are not limited to, time of day, date, geo-location, day of week, detection of indoor light versus outdoor light, connected network(s), firewall(s), facial recognition, presence/absence of infrared light, touch event(s), audio event(s), connected peripheral(s), proximity, orientation, velocity, and humidity, among others, and may be determined/detected by the user's electronic device.
- delivery of the digital content may include receipt/decryption of the information/digital content.
- the user's electronic device may continue to deliver/display the digital content only as long as the one or more viewing conditions are satisfied (Blocks 320 - 1 and 320 - 2 ).
- the digital content delivered/displayed in Blocks 310 - 2 and/or 320 - 2 may be either encrypted or unencrypted.
- the digital content may be either be simulated (e.g., using operations illustrated in FIGS. 1A-2B and 4-7 ) or unsimulated.
- operations described herein may be used in combination with a physical privacy screen (e.g., a physical privacy filter/shield).
- a physical privacy screen may be a physical material on a display screen of an electronic device.
- the physical privacy screen may be a removable (e.g., attachable/detachable) physical privacy screen.
- the physical privacy screen may help to reduce/prevent capture by an external recording device of images/text displayed by the display screen of the electronic device.
- the physical privacy screen may reduce/prevent screen capture by an external still-image/video recording device.
- the physical privacy screen may be used in combination with operations of any of FIGS. 1A-7 .
- the operations of FIG. 1A may include determining whether a physical privacy screen is used with the electronic device, and simulating (Block 110 ) the displayable content at the electronic device may include providing a first simulation of the displayable content in response to determining that the physical privacy screen is used with the electronic device, or providing a second simulation of the displayable content in response to determining that the physical privacy screen is absent from the electronic device.
- operations of simulating (Block 110 ) the displayable content may vary in response to whether the physical privacy screen is used with (e.g., is on) the electronic device.
- the frequency with which the representations in Blocks 110 B- 1 , 110 B- 2 , 110 C- 1 , and 110 C- 2 of FIGS. 1B and 1C are displayed may increase or decrease, depending on whether the physical privacy screen is used.
- the physical privacy screen may be combined with operations of determining whether viewing conditions are met. For example, referring to FIG. 3 , determining (Block 310 - 1 ) whether one or more viewing conditions are met with respect to the electronic device may include determining whether a physical privacy screen is used with the electronic device. In particular, in some embodiments, delivery/display (Block 310 - 2 ) of content may require the presence of the physical privacy screen. Moreover, it will be understood that the presence of the physical privacy screen may be determined using a sensor of the electronic device, or may be determined based on a setting of an electronic application used by a user of the electronic device (e.g., a user may indicate via a graphical user interface that a physical privacy screen is on the electronic device).
- Operations of determining whether viewing conditions are met may be performed using one or more sensor devices of an electronic device.
- the nature of such sensors will typically vary in accordance with the viewing conditions at issue.
- a Global Positioning System (GPS) device may determine the geo-location of a user of the electronic device.
- a gyroscope or other motion sensor may detect movement and/or orientation of the electronic device.
- a GPS device and/or a gyroscope may be used to determine a position of the electronic device when the viewing conditions at issue are based on position, motion, orientation, etc.
- biometric sensors When the viewing conditions are biological, biometric sensors may be employed. For example, a viewing condition requiring that the device be operated by a living person may be met using a cardiometer. A viewing condition requiring that the operator not be in a state of duress could be met by a blood pressure sensor or a sensor measuring the conductivity of the operator's body. A viewing condition requiring that the device's operator be a particular individual could be met using a fingerprint reader, etc.
- FIG. 4 a diagram is provided illustrating subsets of pixels that are displayed during different time periods T 1 -T 3 at a user's electronic device.
- the first and second subsets of pixels corresponding to the first and second time periods T 1 and T 2 illustrated in FIG. 4 may be displayed according to the operations in Blocks 110 B- 1 and 110 B- 2 of the flowchart in FIG. 1B .
- FIG. 4 illustrates subsets of pixels that are displayed during different time periods T 1 -T 3 at a user's electronic device.
- FIG. 4 illustrates that by displaying the first through third subsets of pixels during different time periods T 1 -T 3 (as well as any additional subsets of pixels, during respective additional time periods, that may be necessary to provide the entire plurality of pixels illustrating an image that spells out the word “YES”), a user will see the word “YES,” whereas a screenshot of the user's electronic device at any particular moment (e.g., the time T 2 ) will capture only a subset of the pixels. Accordingly, FIG. 4 provides an example of how simulating digital content according to various operations described herein can protect digital content from screenshots.
- FIG. 5 a diagram is provided illustrating an example of using operations according to various embodiments described herein to reduce/prevent screenshotting of a received photo.
- a user of a first electronic device may take a photo (Operation 510 ).
- the user of the first electronic device may then indicate the photo as private (Operation 520 ) before sending the photo to a recipient who is using a second electronic device (Operation 530 ).
- An electronic application e.g., a messaging application
- the first electronic device may extrude (e.g., break up into subsets)(Operation 540 ) the photo and deliver (Operation 550 ) the extruded photo to the recipient who is using the second electronic device.
- the recipient using the second electronic device may view (Operation 560 ) the photo and/or attempt (Operation 570 ) to take a screenshot of the photo.
- the extruded photo may be simulated to the recipient using the simulation operations illustrated in any of FIGS. 1-2B and 4 . Accordingly, when the recipient attempts to take a screenshot in Operation 570 , the screenshot will capture a garbled image (as illustrated in Operation 570 of FIG. 5 ) rather than capturing the complete photo.
- FIG. 6 a diagram is provided illustrating an example of using operations according to various embodiments described herein to reduce/prevent screenshotting of a received text message.
- a user of an electronic device may receive a text message alert (Operation 610 ).
- various embodiments described herein may use an electronic application (e.g., a messaging application) capable of transmitting text, images, documents, and emails.
- the electronic application may transmit such content using secure encrypted channels.
- the electronic application may include functionality present in messaging applications such as BBM, Apple Inc.'s iMessage, WhatsApp Inc.'s WhatsApp Messenger, and the like.
- a sender and a recipient of a message may be using respective copies/instances of an electronic application according to various embodiments described herein, and that the sender's copy/instance of the electronic application may deliver the message to the recipient in pieces/subsets.
- the text message may be delivered to the recipient in randomized, encrypted pieces.
- any message and/or content delivered by an application according to various embodiments described herein may be encrypted in randomized pieces, and the content may never be completely decrypted because a recipient's electronic application may only simulate the content.
- content snippets may be rapidly spliced (e.g., spliced in fractions of a second) on the display screen of the recipient's electronic device such that the human eye thinks it is perceiving the complete content (Operation 630 ).
- operations in any of FIGS. 1A-1C may be used to effectively stream the randomized pieces of content to the display screen at a high frequency. To provide an analogy, this may be conceptually similar to video frames, but where each frame includes a piece of the original content. Accordingly, when the frames are played back at a high frame rate, the human eye may be fooled into thinking that it is viewing a static image.
- a recipient attempting to screenshot the text message may only capture an unreadable image (rather than the received text “this is what a text message looks like to the user's eye while viewing”).
- the recipient attempts to capture the content that is on the display screen
- the resulting captured image may merely be the encrypted, randomized slice (e.g., piece/subset) of the content that is displayed at the particular point in time of capture.
- the captured image may be incomplete/unreadable because the content on the display screen may be simulated to the recipient using the simulation operations illustrated in any of FIGS. 1-2B and 4 .
- FIG. 7 a diagram is provided illustrating audible and inaudible zones of sound that can be produced by a speaker of a user's electronic device.
- one or more of the viewing conditions described herein must be met for the user's electronic device to produce sound in an audible zone 700 that is understandable to a human ear.
- an electronic application may dictate that the audio content of the message may only be understandable to a human ear if one or more viewing conditions are met.
- the audio content may either not be produced at all by the speaker of the user's electronic device or may otherwise be produced in an inaudible 710 form.
- the operations illustrated in the flowchart of FIG. 3 may be used to deliver digital visual content and/or digital audio content.
- FIG. 8 presents an example of a device in accord with the present invention.
- the device 800 may take the form of a desktop computer, portable computer, smartphone, tablet, or other electronic device.
- the device 800 typically includes, at least, a network interface 804 , a processor 808 , a user interface 812 , and a memory 816 .
- the network interface 804 allows the device 800 to receive communications containing information corresponding to digital content, such as videos, photos, text, SMS or MMS messages, etc.
- Suitable network interfaces 804 include gigabit Ethernet, Wi-Fi (802.11a/b/g/n), and 3G/4G wireless interfaces such as GSM/WCDMA/LTE that enable data transmissions between device 800 and other devices.
- the processor 808 takes the communications received through the network interface 804 and processes them for simulated display in accord with the methods and processes discussed above.
- a typical processor 808 is an x86, x86-64, or ARMv7 processor, and the like.
- the user interface 812 allows the device 800 to display simulated digital content to a user.
- Exemplary user interfaces 812 include liquid crystal displays (LCDs), cathode ray tubes (CRTs), light-emitting diode (LED) displays, etc. of various forms and sizes; often integrated with the device 800 , although sometimes separate therefrom.
- LCDs liquid crystal displays
- CRTs cathode ray tubes
- LED light-emitting diode
- the memory 816 provides both transient and persistent storage for data received via the network interface 804 , data processed by the processor 808 , and data sent via the user interface 812 .
- Suitable memories 816 random access memory (RAM), disk-based storage, non-volatile semiconductor memory implementations, etc.
- the possibility of private and/or confidential content becoming compromised may be addressed by using ephemeral messaging (e.g., temporary simulations), chaotic frequency modulation, and/or high-level encryption.
- ephemeral messaging e.g., temporary simulations
- chaotic frequency modulation e.g., chaotic frequency modulation
- high-level encryption e.g., high-level encryption
- an unintended viewer/recipient may attempt to view content, either intentionally or by casual eavesdropping.
- Some embodiments described herein may address this risk by determining/requiring that various viewing conditions are met, to ensure that only the owner (and/or intended recipient) of the content is able to see it.
- These conditions include, but are not limited to, facial recognition, ambient-light detection, geo-location, probabilistic gyroscopic information (e.g., information that 90% of the time a user holds a device at an angle within a specific range), etc.
- Example scenarios could be as follows:
- an adversarial recipient may attempt to view displayable content.
- An adversarial recipient may be someone who is, or once was, thought to be a trusted party to confidential information, and who subsequently attempts to disseminate the information/content.
- Some embodiments herein may address this risk by rendering the displayed content in such a manner as to be difficult, if not impossible, to capture in a permanent record.
- all content, whether text, audio, image, or video may be encrypted and delivered to the recipient's display device only in part(s), and only the recipient's device may be capable of re-ordering the content into a coherent form. If an adversarial recipient attempts to screen-capture the device, the only information captured may be a randomized and/or encrypted snippet of the original content.
- Content capture can occur in various forms, such as screenshots and the use of external cameras/recording devices.
- Screenshotting common with modern electronic devices, is the act of using an electronic device to capture a single instant of the displayed content on the electronic device itself.
- Some embodiments herein, however, may address the risk of screenshotting by rendering any and every single instant of displayed content as a randomized, possibly encrypted, pixelated image.
- some embodiments herein may protect against this risk by rendering the display screen of the electronic device unreadable/unviewable in response to viewing conditions (e.g., conditions agreed to by the sender and/or recipient of the content) that may detect the presence of such external devices.
- viewing conditions e.g., conditions agreed to by the sender and/or recipient of the content
- a formerly trusted intended recipient may no longer be trustworthy.
- This type of recipient is one who, for example, may be part of a group, organization, or corporation and subscribes to, or is otherwise regularly sent, content provided by the parent entity.
- An example of this is an employee receiving corporate emails. If the employee is terminated, the corporation may elect to remove access to corporate accounts.
- Some embodiments herein may enable the corporation to not only restrict access to future emails, but, because the actual content served to the employee may only be simulated and never transmitted in whole, restrict access to past emails as well.
- a breach of security may occur with respect to an electronic device.
- an electronic device that receives a message may be beneficial to protect against multiple forms of breach, including breach with respect to incoming content that may be inadvertently readable to the now-adversarial electronic device, as well as breach with respect to access to past content that may be “hackable” from the hardware of the electronic device.
- Some embodiments herein may disable visibility of protected content in both of these example breach scenarios.
- the electronic device may only render the simulated content if all viewing conditions are met. For example, a combination of facial recognition and fingerprint presence may be used to meet the viewing conditions. An adversarial user of the electronic device would not meet these requirements.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
-
- 1) A user leaves his phone on his desk while stepping away momentarily. He then receives a message at an application, which results in an alert indication at his phone. His co-worker, curious to see what the message is, picks up the phone to view the message. Although the co-worker may open/operate an application that would otherwise allow the co-worker to view the message, a forward-facing camera of the phone may enable facial recognition, and viewing of the message may be disabled after determining that the co-worker is not the owner of the phone.
- 2) A user receives a message in a crowded environment. When she opens the message to view its contents, the phone is jokingly snatched from her hand. The message's privacy settings have been set to high, and the messaging application, using accelerometer and gyroscopic information to detect a sudden movement, immediately disables viewing of the message.
Claims (14)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/340,214 US9372965B2 (en) | 2013-07-24 | 2014-07-24 | Methods and apparatus for displaying simulated digital content |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201361857832P | 2013-07-24 | 2013-07-24 | |
| US14/340,214 US9372965B2 (en) | 2013-07-24 | 2014-07-24 | Methods and apparatus for displaying simulated digital content |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20150033366A1 US20150033366A1 (en) | 2015-01-29 |
| US9372965B2 true US9372965B2 (en) | 2016-06-21 |
Family
ID=52391675
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US14/340,214 Active 2034-10-15 US9372965B2 (en) | 2013-07-24 | 2014-07-24 | Methods and apparatus for displaying simulated digital content |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US9372965B2 (en) |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9483814B1 (en) * | 2014-03-17 | 2016-11-01 | Bulldog Software LLC | Methods and apparatus for the filtering of spatial frequencies |
| US11055445B2 (en) * | 2015-04-10 | 2021-07-06 | Lenovo (Singapore) Pte. Ltd. | Activating an electronic privacy screen during display of sensitve information |
| US10157333B1 (en) | 2015-09-15 | 2018-12-18 | Snap Inc. | Systems and methods for content tagging |
| US12411890B2 (en) * | 2015-12-08 | 2025-09-09 | Snap Inc. | System to correlate video data and contextual data |
| US10984140B2 (en) * | 2017-12-21 | 2021-04-20 | Disappears.Com Holdings (Canada) Ltd. | Method for detecting the possible taking of screenshots |
| JP7140200B2 (en) * | 2018-09-25 | 2022-09-21 | 京セラドキュメントソリューションズ株式会社 | Information processing device, image forming device |
| US11997219B1 (en) * | 2019-02-25 | 2024-05-28 | United Services Automobile Association (Usaa) | Network security for remote workers |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030097408A1 (en) * | 2001-11-19 | 2003-05-22 | Masahiro Kageyama | Communication method for message information based on network |
| US20040003393A1 (en) * | 2002-06-26 | 2004-01-01 | Koninlkijke Philips Electronics N.V. | Method, system and apparatus for monitoring use of electronic devices by user detection |
| US20070033419A1 (en) * | 2003-07-07 | 2007-02-08 | Cryptography Research, Inc. | Reprogrammable security for controlling piracy and enabling interactive content |
| US20070253065A1 (en) * | 2006-04-26 | 2007-11-01 | Doczy Paul J | Privacy screen mounting system |
| US20090174658A1 (en) * | 2008-01-04 | 2009-07-09 | International Business Machines Corporation | System and method of adjusting viewing angle for display based on viewer positions and lighting conditions |
| US20140078164A1 (en) * | 2012-09-17 | 2014-03-20 | Elwha Llc | Unauthorized viewer detection system and method |
-
2014
- 2014-07-24 US US14/340,214 patent/US9372965B2/en active Active
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030097408A1 (en) * | 2001-11-19 | 2003-05-22 | Masahiro Kageyama | Communication method for message information based on network |
| US20040003393A1 (en) * | 2002-06-26 | 2004-01-01 | Koninlkijke Philips Electronics N.V. | Method, system and apparatus for monitoring use of electronic devices by user detection |
| US20070033419A1 (en) * | 2003-07-07 | 2007-02-08 | Cryptography Research, Inc. | Reprogrammable security for controlling piracy and enabling interactive content |
| US20070253065A1 (en) * | 2006-04-26 | 2007-11-01 | Doczy Paul J | Privacy screen mounting system |
| US20090174658A1 (en) * | 2008-01-04 | 2009-07-09 | International Business Machines Corporation | System and method of adjusting viewing angle for display based on viewer positions and lighting conditions |
| US20140078164A1 (en) * | 2012-09-17 | 2014-03-20 | Elwha Llc | Unauthorized viewer detection system and method |
Also Published As
| Publication number | Publication date |
|---|---|
| US20150033366A1 (en) | 2015-01-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9372965B2 (en) | Methods and apparatus for displaying simulated digital content | |
| ES2870509T3 (en) | Method and system of messaging and content exchange controlled by the issuer | |
| US9553833B2 (en) | Confidential messages in a group chat | |
| US20150007351A1 (en) | Mobile Messaging Enhanced with Concealable and Selectively Revealable Text, Image, and Video Messages | |
| US20130194301A1 (en) | System and method for securely transmiting sensitive information | |
| CN114080594A (en) | Notification tagging for workspaces or applications | |
| US9083937B1 (en) | Cameras and image processing methods for respecting recording restrictions | |
| EP2996361A1 (en) | Method and system for secure messaging in social network | |
| US10439995B2 (en) | Method and system for secure private communications | |
| US20190065790A1 (en) | Method Of Displaying Content On A Screen Of An Electronic Processing Device | |
| CN104715337A (en) | Attendance method, and attendance management method and device | |
| CN104066060A (en) | Realization method of time-reading protection and ephemeral message in mobile terminal instant messaging | |
| US10706161B2 (en) | Secured media file presentation | |
| WO2016074551A1 (en) | Mobile terminal and method and device for displaying notification message thereof, and computer storage medium | |
| US20160034718A1 (en) | Method and apparatus for communicating private messages with partially obscured content to limit or prevent unauthorized use of data to impede privacy violations | |
| KR20160108136A (en) | A Method and Apparatus For Providing a Secure Mode for User Device | |
| US11677846B1 (en) | Privacy-preserving first-party tracking | |
| GB2512140A (en) | Messaging system and method | |
| US10984140B2 (en) | Method for detecting the possible taking of screenshots | |
| EP3729851B1 (en) | Method for detecting the possible taking of screenshots | |
| CN111448564B (en) | Method for displaying content on screen of electronic processing equipment | |
| CN115600235A (en) | Data access method, device, equipment and storage medium | |
| EP3038298A1 (en) | A computer-implemented method for protecting classified content on a computing device and computer programs thereof | |
| Kelec et al. | Privacy threats on Android devices—Big brother is watching you | |
| KR101773915B1 (en) | System and method for providing hidden view service |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| AS | Assignment |
Owner name: PRYON INCORPORATED, NORTH CAROLINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JABLOKOV, IGOR RODITIS;REEL/FRAME:046799/0413 Effective date: 20170831 |
|
| FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: SURCHARGE FOR LATE PAYMENT, SMALL ENTITY (ORIGINAL EVENT CODE: M2554); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 8 |
|
| AS | Assignment |
Owner name: FIRST-CITIZENS BANK & TRUST COMPANY, AS AGENT, NORTH CAROLINA Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNOR:PRYON INCORPORATED;REEL/FRAME:073438/0899 Effective date: 20250630 |